Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of...

37
Social Engineering Cybersecurity Awareness

Transcript of Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of...

Page 1: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Social Engineering

Cybersecurity Awareness

Page 2: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

About Social Engineering

Page 3: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

What is Social Engineering ?

Social Engineering is the art of manipulating people into performing actions that lead to

breach of confidential data & give access to personal sensitive information.

Information

Gathering

Development

of

Relationship

Exploiting

Relationship

Execution to

Achieve the

Objective

Page 4: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Collect sensitive information

Identity theft

What are they searching for?

Targeted attacks

Page 5: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Why they Succeed?

Human nature of trust

Lack of information security awareness

Lack of security policy and procedures

Lack of information access rights

Page 6: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Social Engineering

Techniques

Page 7: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Techniques

Vishing

SMiShing

Phishing

Tailgating

Baiting

Shoulder surfing

Dumpster Diving

Page 8: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Social Engineering

Phishing

Page 9: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Phishing

It is a kind of email fraud where the fraudster sends out a legitimate looking email posing as a trusted entity which is designed to extract sensitive information.

94% of malware is delivered

via email

Did You Know?

Source: https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html

Page 10: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Phisher

Bank

Internet Consumer

Page 11: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Phishing: General Phishing

What is it?Email messages claiming to comefrom trusted sources like your bankasking you to verify your account, re-enter your personal information ormake a payment.

Why?To trick you into providing your bankaccount details in order to accessyour bank account then steal yourmoney

How to Avoid?Compare these messages with onesyou already have and call the sourceto re-verify

Page 12: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Phishing: Spear Phishing

What is it?Email messages usually targetinghigher profile people who havevaluable information

Why?Directly targeting you to access yourbank account then steal your moneyor collect sensitive information

How to Avoid?Look out for spelling mistakes andfake URLs

Page 13: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Phishing: Authority Fraud

What is it?Email messages with addressessimilar to that of an authority torequest confidential information orrequest payments within the country.

Why?To trick the victim to provideconfidential information or transfermoney to the cybercriminals

How to Avoid?Double-check suspicious requestswith the authority before providinginformation or sending money

Page 14: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Phishing: Pharming

What is it?Redirecting website traffic throughhacking which may cause users tofind themselves on an illegitimatewebsite without realizing they havebeen redirected to an impostor site,which may look exactly like the realsite.

Why?To intercept and steal sensitiveinformation or online payments

How to Avoid?Check the URL and look for securecertificate

Page 15: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Phishing: ExamplesFake Email Messages

Page 16: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Phishing: ExamplesFake Email Messages

Page 17: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Phishing: ExamplesFake Websites

Page 18: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Example Scam

@

Attacker creates a fake

property ad with

lucrative offer.

The ad is published by

attacker on www.

example.com

User sees a

lucrative ad offer

The user sends email to the mentioned email address

The attacker asks for money to lock down the offer

User sends 2,000.

Page 19: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Social Engineering

Vishing

Page 20: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Vishing

Collecting sensitive information or attempting to influence action via the telephone. To obtain valuable information that could contribute to the direct compromise of the victim or the organization by exploiting peoples’ trust and willingness to help

Page 21: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Vishing news

Source:https://www.infosecurity-magazine.com/news/vishing-attacks-to-become/https://gulfnews.com/business/banking/uae-banking-sector-joins-law-enforcement-agencies-to-fight-fraud-1.70971327https://www.csbj.com/2020/04/10/hackers-exploit-pandemic-to-attack-businesses/

Page 22: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

“Hello. This is Alex calling from your telecom provider.

You have a refund due which I would like to remind you

of, but first can you please provide your credit card

number for verification before we proceed ? “

Vishing: Examples Fake Phone call

Page 23: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Social Engineering

SMiShing

Page 24: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

SMiShing

Using mobile phone text messages (SMS) to push victims into immediate action such as downloading mobile malware, visiting a malicious website or calling a fraudulent phone number extract sensitive information or steal money

Page 25: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

SMiShing: ExamplesFake SMS

Page 26: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Social Engineering

Baiting

Page 27: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Baiting

With the use of physical media

like a USB or a CD, the attacker

tries to capture the attention of

the victim by giving it a

mysterious label and

deliberately placing it where it

can be easily found (washroom,

elevator etc).

Page 28: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Social Engineering

Tailgating

Page 29: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Tailgating

Physically following someone into a limited access area

Could you please

open the door?

My hands are full..

Page 30: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Social Engineering

Shoulder Surfing

Page 31: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Shoulder Surfing

Shoulder surfing is watching

someone’s login credentials, ID

number, POS terminal PIN, ATM

PIN or any other personal secret

credentials by looking over their

shoulder while they are using it.

Page 32: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Social Engineering

Dumpster Diving

Page 33: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Dumpster DivingIt is a method of stealing personal information by digging through a company’s dumpster or trash

Login:

Password:

john

wombat55

Page 34: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Social Engineering

Protect yourself and your organization

Page 35: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Best Practices

Information Security Awareness Trainings

Build a security-aware culture

Be aware of providing personal information to avoid being a

victim of phishing, Vishing or SMiShing attacks

01

Establish Policies & Procedures to recognize and respond to

social engineering threats02

03

04

Page 36: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Have a proper waste management system to avoid dumpster

diving

Respectfully refuse to lend your identity token / security pass

to avoid tailgaters access the building

Do not use a device on your computer unless it belongs to you

or is given to you for a purpose from a trustworthy person

Review the above steps periodically

If you are an organization, perform unannounced periodic

tests of the network05

06

07

08

09

Page 37: Social Engineering - oic-cert.org Engineering EN.pdf · Social Engineering is the art of manipulating people into performing actions that lead to ... With the use of physical media

Questions